Monday, 24 November 2014

Forgot Mac Password ? How to Reset Your Mac Password ?


How to run the Password Reset utility in OS X 10.7 Lion

Apple has hidden the Password Reset utility in OS X Lion's Recovery partition. Here is how to get it running again.

Apple_unlock.JPG.jpg
Apple included a "Reset Password" utility that you could use to reset forgotten passwords for accounts on the system. In the recovery options for OS X Lion, this program is missing from the "Utilities" menu where it used to reside, so people looking to reset their lost passwords may be a bit perplexed as to how to do this. While the program is no longer available through the Utilities menu, it is included on the recovery system and can be used, but you will have to open it by alternative means.
Some people may be thankful that Apple removed this option, because it makes it slightly more difficult to reset passwords on the system. While a reset password will not unlock keychains and other secured items on the system, it will allow access to the system and allow someone to view documents and run programs.
To access the Reset Password utility, you will need to use the Terminal in the Recovery system, so first boot to the recovery partition by holding Command-R at start-up (or by holding Option and selecting "Recovery HD" from the boot menu), and then selecting Terminal from the Utilities menu.
When this is done and a Terminal window is open, simply run the command resetpassword (all lowercase) to launch the Reset Password utility.
The program will launch, but do not close the Terminal window or the program will be killed as well. It is normal to see program output messages show up in the Terminal window when opening programs in this manner, so don't worry if you see a warning or two show up there.
With the Password Reset utility now open, you can select the volume and the account, and change the password for that account.

Saturday, 15 November 2014

Self-repairing software tackles malware.

Computer scientists have developed software that not only detects and eradicates never-before-seen viruses and other malware, but also automatically repairs damage caused by them. The software then prevents the invader from ever infecting the computer again.



University of Utah computer scientists have developed software that not only detects and eradicates never-before-seen viruses and other malware, but also automatically repairs damage caused by them. The software then prevents the invader from ever infecting the computer again.


A3 is a software suite that works with a virtual machine -- a virtual computer that emulates the operations of a computer without dedicated hardware. The A3 software is designed to watch over the virtual machine's operating system and applications, says Eric Eide, University of Utah research assistant professor of computer science leading the university's A3 team with U computer science associate professor John Regehr. A3 is designed to protect servers or similar business-grade computers that run on the Linux operating system. It also has been demonstrated to protect military applications.
The new software called A3, or Advanced Adaptive Applications, was co-developed by Massachusetts-based defense contractor, Raytheon BBN, and was funded by Clean-Slate Design of Resilient, Adaptive, Secure Hosts, a program of the Defense Advanced Research Projects Agency (DARPA). The four-year project was completed in late September.
There are no plans to adapt A3 for home computers or laptops, but Eide says this could be possible in the future.
"A3 technologies could find their way into consumer products someday, which would help consumer devices protect themselves against fast-spreading malware or internal corruption of software components. But we haven't tried those experiments yet," he says.
U computer scientists have created "stackable debuggers," multiple de-bugging applications that run on top of each other and look inside the virtual machine while it is running, constantly monitoring for any out-of-the-ordinary behavior in the computer.
Unlike a normal virus scanner on consumer PCs that compares a catalog of known viruses to something that has infected the computer, A3 can detect new, unknown viruses or malware automatically by sensing that something is occurring in the computer's operation that is not correct. It then can stop the virus, approximate a repair for the damaged software code, and then learn to never let that bug enter the machine again.
While the military has an interest in A3 to enhance cybersecurity for its mission-critical systems, A3 also potentially could be used in the consumer space, such as in web services like Amazon. If a virus or attack stops the service, A3 could repair it in minutes without having to take the servers down.
To test A3's effectiveness, the team from the U and Raytheon BBN used the infamous software bug called Shellshock for a demonstration to DARPA officials in Jacksonville, Florida, in September. A3 discovered the Shellshock attack on a Web server and repaired the damage in four minutes, Eide says. The team also tested A3 successfully on another half-dozen pieces of malware.
Shellshock was a software vulnerability in UNIX-based computers (which include many web servers and most Apple laptops and desktop computers) that would allow a hacker to take control of the computer. It was first discovered in late September. Within the first 24 hours of the disclosure of Shellshock, security researchers reported that more than 17,000 attacks by hackers had been made with the bug.
"It is a pretty big deal that a computer system could automatically, and in a short amount of time, find an acceptable fix to a widespread and important security vulnerability," Eide says. "It's pretty cool when you can pick the Bug of the Week and it works."
Now that the team's project into A3 is completed and proves their concept, Eide says the U team would like to build on the research and figure out a way to use A3 in cloud computing, a way of harnessing far-flung computer networks to deliver storage, software applications and servers to a local user via the Internet.
The A3 software is open source, meaning it is free for anyone to use, but Eide believes many of the A3 technologies could be incorporated into commercial products.
Other U members of the A3 team include research associate David M. Johnson, systems programmer Mike Hibler and former graduate student Prashanth Nayak.

Story Source:
The above story is based on materials provided by University of Utah.




A distant planet may lurk far beyond Neptune.

If Planet X exists, it may be anywhere from 250 to 1,000 times as far from the sun as Earth.

planetx_feat_free.jpgOut beyond Neptune, the solar system resembles the deep ocean: dark, remote and largely unexplored. To an Earth-bound observer, even the brightest objects, such as Pluto, are 4,000 times as faint as what the human eye can see. An undiscovered planet could easily lurk out there unnoticed, a possible fossil from a time when the giant planets jockeyed for position 4 billion years ago, scattering planets and asteroids in their wake. But even the largest telescopes would struggle to find such a faint spot of light. Most likely, the clues would be entangled in the distorted orbits of faraway ice boulders tumbling around the sun.
Astronomers Chad Trujillo and Scott Sheppard provided a hint about how such a world might reveal itself last March when they announced the discovery of a 450-kilometer-wide dwarf planet just outside the Kuiper belt — the icy debris field past Neptune. 
Their find, designated 2012 VP113, is on a course that loops around the sun in a vastly elongated orbit far from the known planets. It has thousands of neighbors but shares its odd trajectory only with Sedna, another dwarf planet, discovered in 2003.
“They’re kind of in a no-man’s-land,” says Sheppard, of the Carnegie Institution for Science in Washington, D.C. “These objects couldn’t get out there with what we currently know.”
Something had to drag the two dwarf planets from their original, smaller orbits. Except nothing is close or massive enough to take the credit. At least, nothing astronomers are aware of.
The discovery of 2012 VP113 confirmed that Sedna is not a fluke but is possibly the first of a large population of icy bodies distinct from others in the rest of the solar system. So Trujillo and Sheppard continued to poke around the Kuiper belt, and the mystery deepened. They noticed that beyond 150 astronomical units (150 times the distance from the sun to the Earth), 10 previously discovered objects, along with Sedna and 2012 VP113, follow orbits that appear strangely bunched up.
“That immediately piqued our interest,” says Sheppard. Could an unseen planet, a Planet X, be holding the orbits of all these far-out bodies in place?
“The idea’s not crazy,” says David Jewitt, a planetary scientist at the University of California, Los Angeles. “But I think the evidence is slim.” The trail of bread crumbs leading to an undiscovered planet is sparse: just 12 chunks of ice lead the way. But it’s enough to get some researchers wondering about a ninth (or 10th, depending on your attitude regarding Pluto) planet roaming the outer solar system and how it might have arrived there.

Kuiper belt clues

“The exciting thing for me is that 2012 VP113 exists,” says Megan Schwamb, a planetary scientist at Academia Sinica in Taipei, Taiwan. “Whatever put Sedna on its orbit should have put a whole bunch of other objects out there.”

Distant wanderers

Dwarf planets Sedna and 2012 VP113 travel well beyond the known planets and the Kuiper belt along highly stretched orbits, which implies something once dragged them out there.
Credit: E. Otwell
The enormous, stretched orbits of Sedna and 2012 VP113 are unlike anything else in the solar system. Both are too far from Neptune to feel its effects. And they’re too far from the Oort cloud, the distant shell of ice boulders thought to envelop the solar system. Their trajectories could be a relic of a passing star, or the changing influence of the Milky Way’s gravity as the sun moves around the galaxy — or of a massive planet, long-gone or yet to be detected.
The case for an additional planet got stronger when Trujillo and Sheppard realized that Sedna and 2012 VP113 had something in common with 10 other objects. All the objects beyond 150 astronomical units come closest to the sun, a point known as perihelion, at nearly the same time that they cross the plane of the solar system. There’s no reason for these perihelia to bunch up like that. Billions of years of evolution should have left the perihelia scattered, like the rest of the Kuiper belt — unless something was holding the perihelia in place.
Trujillo and Sheppard estimated that a planet about two to 15 times as massive as Earth, at a distance of  250 astronomical units (about eight times as far from the sun as Neptune) could explain why these 12 perihelia were bunched together. But the astronomers admit that’s not the only possibility. A closer planet as massive as Mars would have the same effect as a Neptune-mass body much farther away.
“A few years ago everyone thought that nothing relevant other than just plain asteroids and comets inhabited that region,” says physicist Carlos de la Fuente Marcos. “Now the observational evidence indicates that probably we were wrong.” He and his brother Raúl, both at the Complutense University of Madrid,took a closer look at the orbits. The brothers claim, in the Sept. 1 Monthly Notices of the Royal Astronomical Society Letters, that not one but two planets are needed to explain the perihelion clustering.
Around the same time, physicist Lorenzo Iorio at the Ministry of Education, Universities and Research in Bari, Italy, offered a different take. He says that the planet proposed by Trujillo and Sheppard, if it exists, must be much farther out — at least twice as far as the original prediction. By looking at gradual changes in the orbits of a few of the known planets, Iorio calculated that a planet twice as massive as Earth must be at least 500 astronomical units from the sun,according to research in the Oct. 11 Monthly Notices of the Royal Astronomical Society Letters.
Others are more cautious. “The outer solar system can be full of all sorts of unseen and interesting things,” Jewitt says, “but the argument ... for a massive perturber is a bit puzzling.” First, 10 of the 12 bodies with peculiar perihelia dive far enough into the Kuiper belt to possibly feel Neptune’s gravity. And, second, he says, 12 objects is a tiny sample — the apparent perihelion clustering may just be an illusion caused by where researchers point their telescopes.
The recent speculation about additional planets has a familiar ring, says Jewitt. In the late 1800s and early 1900s, astronomers relied on apparent hiccups in Neptune’s motion and a handful of comets to kick off a search that eventually led to the discovery of Pluto. “Not much has changed since then,” he says. In fact, musings of a planet beyond Neptune have been around since before anyone knew Neptune existed.

Planet hunters

In 1834, German astronomer Peter Andreas Hansen allegedly suggested to a colleague that two planets were needed to explain oddities in the motion of what was then the farthest known planet, Uranus — oddities that led to the discovery of Neptune in 1846. Two years later, French astronomer Jacques Babinet claimed that Neptune also stumbled along its orbit, hinting that a ninth planet must have been causing Neptune to speed up and slow down as it ran around the sun.

A well-worn idea

Enthusiasm for planets beyond Neptune has come and gone over the 168 years since Neptune’s discovery — and will continue as researchers probe deeper into the Kuiper belt.
YearEvent
1846Neptune discovered
1848First prediction of planet beyond Neptune
1851First claimed discovery of unknown planet
1879Comet orbits imply a ninth planet
1892First photographic search for planet ends; nothing found
1906–1916Lowell searches for Planet X until his death
1930Tombaugh discovers Pluto near where Lowell predicted it
1978Charon discovered; Pluto’s mass measured at 0.2% of Earth’s
1992No evidence of Planet X from Voyager 2 measurements of Uranus and Neptune masses
1992Jewitt discovers first recognized Kuiper belt object
2003Sedna discovered
2006Pluto demoted to dwarf planet
20122012 VP113 discovered
2014WISE data show no evidence for large planet in outer solar system
2015New Horizons spacecraft to fly by Pluto
2023Large Synoptic Survey Telescope to begin operations
Over the next half century, the search for more planets went in and out of vogue. Like a game of solar system Whac-A-Mole, new predictions popped up after each claimed discovery was trounced. The predictions relied on observations of Neptune as well as a handful of comets that reached their farthest point from the sun at nearly the same distance, a clue that a massive planet was bringing the comets all to the same point before the comets returned to the sun.
In the early 1900s, Boston-born polymath Percival Lowell got into the planet-hunting game. It’s not clear if Lowell was the first person to use the phrase “Planet X,” but he certainly popularized it. Lowell calculated where Planet X should be, based on observations of Uranus and Neptune. Thirteen years after Lowell died in 1916, American astronomer Clyde Tombaugh picked up the torch, using Lowell’s calculations as a guide. Tombaugh’s systematic observations led him to Pluto in 1930, close to where Lowell predicted Planet X would be.
Pluto’s fall from grace started months after its discovery. Unlike the other eight planets, which travel on flat, circular orbits, Pluto speeds through Neptune’s orbit along a stretched, cockeyed trajectory. The diminutive planet didn’t appear massive enough to push the outer planets around. Estimates for Pluto’s mass dwindled until astronomer James Christy discovered Charon, Pluto’s largest moon, in 1978. Christy used the moon’s motion to weigh Pluto and found that the outermost planet had only 0.2 percent of Earth’s mass. If something was tugging on Uranus and Neptune, Pluto was much too small to be the culprit.
NASA’s Voyager 2 spacecraft settled the Planet X question — for a time. When the probe flew past Uranus and Neptune in the 1980s, it gave astronomers better data to revise the masses of the planets. The new data revealed that nothing was pulling on them. Tombaugh finding Pluto where Lowell’s calculations pointed was just a coincidence.
The search for Planet X quieted, never disappearing, but not taken seriously. Planet X became a favorite of the tinfoil-hat crowd, who were convinced that NASA was hiding knowledge of a planet that would either crash into Earth or hurl a barrage of comets our way. The end, as always, was near.
Modern planetary research has been plagued by rough estimates and few objects to study. “What this means,” Schwamb says, “is the observers need to go back to work.” Only a detailed accounting of the darkness beyond Neptune will help researchers figure out if something is there.
If that something exists, it can’t be as massive as Jupiter or Saturn. Kevin Luhman, an astronomer at Penn State, looked for Jupiter doppelgängers in images from NASA’s WISE satellite, a 10-month mission to scan the entire sky twice with an infrared telescope. Massive planets are best seen in infrared light because they’re still cooling off from their formation. Jupiter, for example, radiates more heat than it receives from the sun.
Reporting in the Jan. 20 Astrophysical Journal, Luhman found no evidence for a Jupiter-mass planet within 82,000 astronomical units. Likewise, there’s no sign of something as massive as Saturn out to about a third as far. But Luhman says he can’t rule out a small, rocky planet, which would be too cold for WISE to pick up.
The best bet is to look for reflected sunlight, which is how scientists discovered Pluto and the Kuiper belt. But even large worlds at such enormous distances are extremely dim. If Pluto was twice as far from the sun, it would be one-sixteenth as bright because the sunlight not only has to get out there but also has to come back.
“We would not yet have detected the Earth,” says Jewitt, “if it were more than 600 astronomical units from the sun.” And that’s assuming researchers knew where to look. “That gives you an idea of the darkness of the outer solar system.”
Story continues below graph

Cramped orbits

All known objects beyond 150 times the distance from the sun to Earth make their closest approach to the sun (perihelion) as they pass through the plane of the solar system. Those perihelia should be spread out like Kuiper belt objects. The reason they are not is a mystery.
Sources: C.A. Trujillo and S.S. Sheppard; JPL/Caltech; IAU Minor Planet Center
Credit: E. Otwell
Instead of trying to directly observe a planet, researchers are looking for more Kuiper belt objects, whose orbits might bear the gravitational signature of something unseen. Trujillo and Sheppard discovered 2012 VP113 as part of an ongoing effort to scan the sky from Cerro Tololo Inter-American Observatory in Chile. Undoubtedly, more interesting objects will turn up.
Most telescope searches, however, are akin to mapping the universe while staring through a drinking straw. Telescopes see a tiny fraction of the sky, and observatories dole out access just a few days at a time. Sheppard says that it will take them several years to cover just 20 percent of the sky.
Enter the Large Synoptic Survey Telescope, or LSST, an 8.4-meter-wide telescope being built in northern Chile with full operations planned for late 2023. Unlike other telescopes, it will have an enormous field of view and will make a decade-long movie of the sky, perfect for looking for moving points of light.
Lynne Jones, an astronomer at the University of Washington in Seattle, says the LSST could find 20,000 to 40,000 more bodies in the Kuiper belt. With about 20 times as many Kuiper belt objects in hand, astronomers should be able to see if there are more objects with bizarre orbits and determine if the bunching of perihelia is real or just an artifact of having found only a few.
Plus, says Jones, LSST could detect an Earth-sized planet out to between 300 and 500 astronomical units, depending on how reflective its surface is.
For planetary scientists, if a remote Planet X exists the question is: How do you form a planet that far from the sun? Renu Malhotra, a planetary scientist at the University of Arizona in Tucson, says the problem is time. At that distance, the planet building materials would have been smeared over a ring several hundred billion kilometers around. “To make a planet the size of the Earth,” says Malhotra, “could take longer than the age of the solar system.” The only solution, she says, is to steal the planet from somewhere else.
Uranus and Neptune are the most likely thieves, pilfering planets from the space between their orbits. Malhotra says that a close encounter with either of those giants could slingshot an Earth-sized ball of rock to well beyond the Kuiper belt.
Planet X might also be extrasolar, says planetary scientist Rodney Gomes of the National Observatory in Rio de Janeiro. The sun was born in a nebula along with several thousand other stars, and many of those probably had planets of their own. As stars jostled each other, planets could have been torn away from one star and captured by the gravity of another. Perhaps Planet X is just the result of a brief game of interstellar catch.
The Large Synoptic Survey Telescope in Chile, illustrated here, will make a 10-year-long movie of the night sky starting in 2023. ~~LSST“The jury’s still out on whether you need to have a planet there or not,” Schwamb says. A close encounter with a passing star could have lured Sedna and 2012 VP113 away from their siblings, like an astronomical pied piper. Stellar flybys are rare, however, and the star must pass close enough for the two dwarf planets to notice but not so close that it disrupts the entire Kuiper belt and possibly the outer planets.
The odds go up if the star is a relative, born in the same nebula as the sun. In addition to tossing planets around, stellar siblings could have tugged on the debris swirling around the sun. The distorted orbits would have frozen in place after the sun’s brothers and sisters drifted away.
For 168 years, the lure of planets hiding beyond Neptune has never faded. The remoteness of the outer solar system, Jewitt says, “leaves open the door to all sorts of wild speculation.”
The hunt for Planet X “is one of those things that’s very high risk,” Luhman says, “but if it was found, it would be a huge discovery.” Astronomers have discovered more than 1,800 planets orbiting other stars, and yet our own backyard is still largely a mystery. “We haven’t explored all of the solar system yet,” Sheppard says, “so people always want to believe that there’s something else out there.”

This story appears in the November 29, 2014, issue with the headline, "Shadow planet: Strange orbits in the Kuiper belt revive talk of a Planet X in the solar system."

Wednesday, 2 July 2014

Windows 100 Keyboard Shortcuts:

More than 100 Keyboard Shortcuts must read:-

Keyboard Shortcuts (Microsoft Windows)
1. CTRL+C (Copy)
2. CTRL+X (Cut)
3. CTRL+V (Paste)
4. CTRL+Z (Undo)
5. DELETE (Delete)
6. SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
7. CTRL while dragging an item (Copy the selected item)
8. CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
9. F2 key (Rename the selected item)
10. CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
11. CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
12. CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
13. CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
14. CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
15. CTRL+A (Select all)
16. F3 key (Search for a file or a folder)
17. ALT+ENTER (View the properties for the selected item)
18. ALT+F4 (Close the active item, or quit the active program)
19. ALT+ENTER (Display the properties of the selected object)
20. ALT+SPACEBAR (Open the shortcut menu for the active window)
21. CTRL+F4 (Close the active document in programs that enable you to have multiple documents opensimultaneously)
22. ALT+TAB (Switch between the open items)
23. ALT+ESC (Cycle through items in the order that they had been opened)
24. F6 key (Cycle through the screen elements in a window or on the desktop)
25. F4 key (Display the Address bar list in My Computer or Windows Explorer)
26. SHIFT+F10 (Display the shortcut menu for the selected item)
27. ALT+SPACEBAR (Display the System menu for the active window)
28. CTRL+ESC (Display the Start menu)
29. ALT+Underlined letter in a menu name (Display the corresponding menu) Underlined letter in a command name on an open menu (Perform the corresponding command)
30. F10 key (Activate the menu bar in the active program)
31. RIGHT ARROW (Open the next menu to the right, or open a submenu)
32. LEFT ARROW (Open the next menu to the left, or close a submenu)
33. F5 key (Update the active window)
34. BACKSPACE (View the folder onelevel up in My Computer or Windows Explorer)
35. ESC (Cancel the current task)
36. SHIFT when you insert a CD-ROMinto the CD-ROM drive (Prevent the CD-ROM from automatically playing)

Dialog Box - Keyboard Shortcuts
1. CTRL+TAB (Move forward through the tabs)
2. CTRL+SHIFT+TAB (Move backward through the tabs)
3. TAB (Move forward through the options)
4. SHIFT+TAB (Move backward through the options)
5. ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
6. ENTER (Perform the command for the active option or button)
7. SPACEBAR (Select or clear the check box if the active option is a check box)
8. Arrow keys (Select a button if the active option is a group of option buttons)
9. F1 key (Display Help)
10. F4 key (Display the items in the active list)
11. BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)

Microsoft Natural Keyboard Shortcuts
1. Windows Logo (Display or hide the Start menu)
2. Windows Logo+BREAK (Display the System Properties dialog box)
3. Windows Logo+D (Display the desktop)
4. Windows Logo+M (Minimize all of the windows)
5. Windows Logo+SHIFT+M (Restorethe minimized windows)
6. Windows Logo+E (Open My Computer)
7. Windows Logo+F (Search for a file or a folder)
8. CTRL+Windows Logo+F (Search for computers)
9. Windows Logo+F1 (Display Windows Help)
10. Windows Logo+ L (Lock the keyboard)
11. Windows Logo+R (Open the Run dialog box)
12. Windows Logo+U (Open Utility Manager)
13. Accessibility Keyboard Shortcuts
14. Right SHIFT for eight seconds (Switch FilterKeys either on or off)
15. Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
16. Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
17. SHIFT five times (Switch the StickyKeys either on or off)
18. NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
19. Windows Logo +U (Open Utility Manager)
20. Windows Explorer Keyboard Shortcuts
21. END (Display the bottom of the active window)
22. HOME (Display the top of the active window)
23. NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
24. NUM LOCK+Plus sign (+) (Display the contents of the selected folder)

MMC Console keyboard shortcuts

1. SHIFT+F10 (Display the Action shortcut menu for the selected item)
2. F1 key (Open the Help topic, if any, for the selected item)
3. F5 key (Update the content of all console windows)
4. CTRL+F10 (Maximize the active console window)
5. CTRL+F5 (Restore the active console window)
6. ALT+ENTER (Display the Properties dialog box, if any, for theselected item)
7. F2 key (Rename the selected item)
8. CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)

Remote Desktop Connection Navigation
1. CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
2. ALT+PAGE UP (Switch between programs from left to right)
3. ALT+PAGE DOWN (Switch between programs from right to left)
4. ALT+INSERT (Cycle through the programs in most recently used order)
5. ALT+HOME (Display the Start menu)
6. CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
7. ALT+DELETE (Display the Windows menu)
8. CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
9. CTRL+ALT+Plus sign (+) (Place asnapshot of the entire client window area on the Terminal server clipboardand provide the same functionality aspressing ALT+PRINT SCREEN on a local computer.)

Microsoft Internet Explorer Keyboard Shortcuts
1. CTRL+B (Open the Organize Favorites dialog box)
2. CTRL+E (Open the Search bar)
3. CTRL+F (Start the Find utility)
4. CTRL+H (Open the History bar)
5. CTRL+I (Open the Favorites bar)
6. CTRL+L (Open the Open dialog box)
7. CTRL+N (Start another instance of the browser with the same Web address)
8. CTRL+O (Open the Open dialog box,the same as CTRL+L)
9. CTRL+P (Open the Print dialog box)
10. CTRL+R (Update the current Web page)
11. CTRL+W (Close the current window)

Tuesday, 3 June 2014

US Companies are looking to hire cybersecurity experts:-

Some of the largest US companies are looking to hire cybersecurity experts in newly elevated positions.
 
US companies looking to hire cyberexperts for top jobs Dextermind: Some of the largest US companies are looking to hire cybersecurity experts in newly elevated positions and bring technologists on to their boards, a sign that corporate America is increasingly worried about hacking threats.

JPMorgan Chase & Co, PepsiCo, Cardinal Health, Deere & Co and The United Services Automobile Association (USAA) are among the Fortune 500 companies seeking chief information security officers (CISOs) and other security personnel to shore up their cyber defenses, according to people with knowledge of the matter.

While a CISO typically reports to a company's chief information officer (CIO), some of the hiring discussions now involve giving them a direct line to the chief executive and the board, consultants and executives said.

After high-profile data breaches such as last year's attack on US retailer Target, there is now an expectation that CISOs understand not just technology but also a company's business and risk management.

"The trend that we are seeing is that organizations are elevating the position of the CISO to be a peer of the CIO and having equal voice associated with resource priorities and risk decisions," said Barry Hensley, executive director at Dell SecureWorks' Counter Threat Unit.

With many companies looking for security executives with military or defense backgrounds, people with the right expertise can command increasingly higher salaries.

Large corporations have recently hired CISOs for between $500,000 and $700,000 a year, according to Matt Comyns, global co-head of the cybersecurity practice at search firm Russell Reynolds Associates. Compensation for CISOs at some technology companies with generous equity grants have reached as high as $2 million, he said.

In comparison, CISOs who have been with a company for five or more years are on $200,000 to $300,000 per year, Comyns said.

New urgency
Security experts have often criticized corporate America for being too complacent about cyber risks and for not doing enough to protect their computer networks from hackers.

A recent PwC survey found the vast majority of cybersecurity programs fell far short of guidelines drafted by the Commerce Department's National Institute of Standards and Technology (NIST). Only 28% of more than 500 executives surveyed said their company had a CISO or chief security officer.

But high-profile data breaches, such as the one at Target, have injected a new sense of urgency, executives said. Target ousted its CEO, Gregg Steinhafel, earlier this month, and its chief information officer, Beth Jacobs, resigned in February. The retailer is now searching for a CISO, a newly created role.

"This is ringing bells at the C-suite," Charlie Croom, vice president of cybersecurity solutions at US defense contractor Lockheed Martin Corp told the Reuters Cybersecurity Summit.

Recruiters and executives said companies are increasing both the size and budget of their security teams. By the end of 2014, JPMorgan's annual cybersecurity budget will rise to $250 million from $200 million in 2012, CEO Jamie Dimon said in April. And the largest U.S. bank will have about 1,000 people focused on cybersecurity, compared with 600 people two years ago, he said.

A JPMorgan spokesman said the bank will continue to invest and expand its security team, but declined to confirm if the firm was looking for a CISO.

Cardinal Health CIO Patty Morrison said the healthcare services company was looking to hire a vice president of security to bring in "new talent and new ideas." USAA Chief Security Officer Gary McAlum confirmed the diversified financial services group was looking for a CISO.

Deere representatives were not available for comment, while a spokesman for PepsiCo declined to comment. The soft drink and snack maker lost its CISO, Zulfi Ahmed, to MetLife Inc earlier this year.

Changing face of boards
As companies look for CISOs, many boards are seeking directors with technology know-how so that they can better understand cyber risks. Matt Aiello, co-head of the cyber practice at Heidrick & Struggles, said he is seeing "unprecedented" demand for CIOs to serve on boards.

"Boards don't feel they have the right expertise to draw upon. It is not that they don't understand it is a risk; they don't want to blunder uninformed into it," said David DiBari, managing partner at the law firm Clifford Chance in Washington.

Retired Accenture CIO Frank Modruson, former Department of Defense CIO Teresa Takai, Dell SecureWorks chief Mike Cote and AT&T Inc CISO Ed Amoroso have all been approached to serve as potential directors, according to people with knowledge of the situation.

Takai said she is "looking at a couple of things," including with a security technology company. Cote, through a Dell spokeswoman, confirmed he has been approached by several companies about serving on their boards. An AT&T spokesman declined to comment on behalf of Amoroso. Modruson was not available for comment.

Pamela Craig, who serves on the boards of Akamai Technologies, Wal-Mart Stores and software maker VMWare, expects demand for CIOs to serve on public boards to increase. "You need people who have direct first-hand experience in the boardroom," she said.

Some boards are also considering moving responsibility for network security to risk committees from audit committees, as cybersecurity is increasingly viewed as a business risk more than a compliance issue, according to Mary Galligan, director of Cyber Risk Services at Deloitte & Touche LLP.

RSA Security Senior Vice President Amit Yoran said boards are looking for experts who can help them build security into products in development, rather than bolting it on at the last minute.

How to make your passwords more secure:-

If the Heartbleed security threat teaches us anything, it's that passwords don't offer total protection.

How to make your passwords more secure Dextermind: Browsers are supposed to keep passwords and other sensitive data safe, but a technical flaw in a widely used padlock security technology allows hackers to grab the information anyway. Even without this latest discovery, there have been countless disclosures of hackers breaking in to grab usernames and passwords, plus credit card numbers and more. That's why many security experts recommend a second layer of authentication: typically in the form of a numeric code sent as a text message. If you're logging in to a website from your laptop, for example, you enter your password first. Then you type in the code you receive via text to verify that it's really you and not a hacker.
I've been using what's known as two-factor authentication or two-step verification on most of my accounts for more than a year, after seeing too many mysterious attempts to reset my Facebook password by someone who isn't me. The main exception was Gmail, but I enabled that recently after the discovery of Heartbleed. I was afraid the second authentication would be a pain to use, but things are going more smoothly than I expected after the initial setup.
The idea behind these double-layer passwords is to make it harder to use a password that's compromised or guessed. You're asked for a second piece of information that only you are supposed to know.
To balance security and convenience, you can typically bypass this check the next time you use the same Web browser or device. It won't help if someone steals your laptop, but it'll prevent others from using your password on their machines. If you're logging in at a library or other public computer, remember to reject the option to bypass that check next time.
The second piece of authentication could be your fingerprint or retina scan, though such biometric IDs are rarely used for consumer services. Financial services typically ask for a security question, such as the name of your childhood pet, the first time you use a particular Web browser or device. That's better than nothing, though answers can sometimes be guessed or looked up. Some banks offer verification codes by text messaging, too.
I like that approach and use it for a variety of email and social networking services. To me, email accounts are the most sensitive because email can be used to reset passwords elsewhere. That includes my banks and shopping sites.
The two-step requirement is fairly simple to turn on. With Google, for instance, it's under the Security tab in your account settings. On Facebook, look for Login Approvals under Security in the settings. With Apple IDs, visit appleid.apple.com rather than the account settings on iTunes.
After you enable it, you'll typically have to sign in to your account again on various Web browsers and devices. After entering your username and password, a code will get set to your phone. You'll have to enter that to finish signing in. This has occasionally meant getting off my couch to grab my phone from the charger, but that's a small price for security.
What if you're somewhere without cellular access and can't receive texts?
Most services have backup mechanisms. Google, Facebook and Microsoft have apps that will let you receive verification codes even when you're offline. Google and Facebook also let you generate 10 backup codes that you can download or print to keep in your wallet. Each can be used only once.
You can also turn off the two-step requirement temporarily if you'll be traveling without cellular access, though I don't recommend it. The reason I turned it on last year was because I was leaving the country and wouldn't be able to deal with further mysterious reset attempts.
Occasionally, you'll run into an app that won't accept the text code. Apple's Mail app on iPhones, iPads and Mac computers is one. Microsoft's Outlook software is another. If that happens, you'll have to go to your service's settings to generate a temporary password for that particular app. It's a pain, but I've rarely needed to do this.
There are several other challenges to making this work smoothly. For example, if you have a shared Twitter account, such as for your company or organization, two-step verification isn't very practical unless you also share your phone. There's a 12-character, hard-to-guess backup code you can use instead. But it's no security if you jot it down next to your main password.
The biggest problem, though, is losing your phone. Some services will let you provide a backup number, including a friend's cellphone or a landline phone. With Google, the code can be sent as a voice message instead of a text. Others offer a complex recovery code, which you'll have to jot down and keep in a safe place.
I know two-layer security is inconvenient. The first password is difficult enough to deal with. But think of the inconvenience involved should someone break into your account and shut you out. Consider the use of verification texts to be insurance.

Wednesday, 28 May 2014

World's most powerful laser pull apart vacuum of space:-



A laser is being developed in Europe that will have the power to rip apart the vacuum of space! So what are they going to do with it?

Plans are currently being drawn up for the Extreme Light Infrastructure (ELI). The goal for the ELI is to build the most powerful lasers ever to exist—over 10 times as powerful as any existing laser.
With current plans for lasers in Hungary, Romania, and the Czech Republic, the first stages of the project look to be completed in 2017. The group behind the ELI want to make these lasers available to the international scientific community to perform advanced physics experiments.
Their end goal involves developing a 200 petawatt laser that will have the power to pull apart the vacuum of space! This laser will be created by combining the beams of 10 smaller lasers—each more powerful that any currently in existence.
At energy levels as high as 200 petawatts, the usual laws of physics will start to break down, giving scientists a glimpse into the origins of our universe.

Contributors